摘要 |
A computer-implemented technique includes obtaining training electronic messages, identifying name context in the training electronic messages, and determining patterns from the name context. The technique can include applying the patterns to the training electronic messages to extract candidate names and selecting a set of the patterns based on the extracted candidate names to obtain a set of patterns. In some implementations, the technique can further include applying the set of patterns to electronic messages associated with a first user having a registered profile, extracting candidate names, and selecting a set of alternate names for the first user from the candidate names. The technique can also include detecting a use of one alternate name from the set of alternate names by a second user, and outputting a suggestion to the second user in response to the detecting, the suggestion being based on the registered profile of the first user. |